
#45 – Quintus Kilbourn on TEEs and Secure Hardware
Into the Bytecode
Exploring Vulnerabilities in Trusted Execution Environments
This chapter explores the security weaknesses tied to Trusted Execution Environments and secure hardware, detailing various attack methods like replay and side-channel attacks. The discussion highlights the urgent need for enhanced defenses as current systems may be inadequate in safeguarding sensitive data.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.